Next: About this document
Up: A First Step towards
Previous: Acknowledgments
References
- BAN89
-
M. Burrows, M. Abadi, and R. Needham.
A logic of authentication.
Technical Report 39, DEC Systems Research Center, February 1989.
- CGP99
-
Edmund Clarke, Orna Grumberg, and Doron Peled.
Model Checking.
MIT Press, 1999.
- CJM98
-
E.M. Clarke, S. Jha, and W. Marrero.
Using state space exploration and a natural deduction style message
derivation engine to verify security protocols.
In In Proceedings of the IFIP Working Conference on Programming
Concepts and Methods (PROCOMET), 1998.
- DY89
-
D. Dolev and A. Yao.
On the security of public key protocols.
IEEE Transactions on Information Theory, 29(2):198-208, March
1989.
- HT96
-
N. Heintze and J. Tygar.
A model for secure protocols and their compositions.
IEEE Transactions on Software Engineering, 22(1):16-30,
January 1996.
- Int93
-
International Standards Organization.
Information Technology - Security techniques -- Entity
Authentication Mechanisms Part 3: Entity authentication using symmetric
techniques, 1993.
ISO/IEC 9798.
- Low96
-
G. Lowe.
Breaking and fixing the Needham-Schroeder public-key protocol
using FDR.
In Tools and Algorithms for the Construction and Analysis of
Systems, volume 1055 of Lecture Notes in Computer Science, pages
147-166. Springer-Verlag, 1996.
- Low97
-
G. Lowe.
A hierarchy of authentication specifications.
In Proceedings of the 1997 IEEE Computer Society Symposium on
Research in Security and Privacy, pages 31-43, 1997.
- Mea94
-
C. Meadows.
A model of computation for the NRL protocol analyzer.
In Proceedings of the 1994 Computer Security Foundations
Workshop. IEEE Computer Society Press, June 1994.
- Mea95
-
C. Meadows.
Formal verification of cryptographic protocols: A survey.
In Advances in Cryptology - Asiacrypt '94, volume 917 of
Lecture Notes in Computer Science, pages 133-150. Springer-Verlag, 1995.
- Mil95
-
J. Millen.
The Interrogator model.
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 251-260. IEEE Computer Society Press, 1995.
- MMS97
-
J. C. Mitchell, M. Mitchell, and U. Stern.
Automated analysis of cryptographic protocols using mur.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy. IEEE Computer Society Press, 1997.
- RN95
-
Stuart Russell and Peter Norvig.
Artificial Intelligence: A Modern Approach.
Prentice Hall Series in Artificial Intelligence, 1995.
- Son99
-
Dawn Song.
Athena: An automatic checker for security protocol analysis.
In Proceedings of the 12th Computer Science Foundation
Workshop, 1999.
- THG98
-
F.Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman.
Strand spaces: Why is a security protocol correct?
In Proceedings of 1998 IEEE Symposium on Security and Privacy,
1998.
- WL93
-
T. Y. C. Woo and S. S. Lam.
A semantic model for authentication protocols.
In Proceedings of the IEEE Symposium on Research in Security and
Privacy, 1993.
Next: About this document
Up: A First Step towards
Previous: Acknowledgments
Adrian Perrig
Fri Sep 1 21:14:38 PDT 2000